Skip to content

v2.8.0 CVE's (CVE-2025-68121, CVE-2025-22871, CVE-2025-15467) #1344

@hero-david

Description

@hero-david

Multiple CVE's are present in the latest release of the TUSD docker image. We detected these via AWS Inspector, which runs on our container regitry, where we cache TUSD in a pull-through configuration from Dockerhub.

This can be verified independently with the Docker scout tool if Docker Desktop is installed:

➜  ~ docker scout cves tusproject/tusd:v2.8.0
    ✓ Pulled
    ✓ Image stored for indexing
    ✓ Indexed 151 packages
    ✓ Provenance obtained from attestation
    ✗ Detected 6 vulnerable packages with a total of 47 vulnerabilities


## Overview

                   │                              Analyzed Image
───────────────────┼──────────────────────────────────────────────────────────────────────────
 Target            │  tusproject/tusd:v2.8.0
   digest          │  2047eda72f63
   platform        │ linux/arm64
   provenance      │ https://github.com/tus/tusd.git#0e52ad650abed02ec961353bb0c3c8bc36650d2c
                   │  0e52ad650abed02ec961353bb0c3c8bc36650d2c
   vulnerabilities │    3C    14H    27M     3L
   size            │ 30 MB
   packages        │ 151

The critical CVSS scores are found amongst the Golang stdlib:

   2C     7H    12M     1L  stdlib 1.24.1
pkg:golang/stdlib@1.24.1

As well as the openssl version for alpine 3.21:

   1C     4H     8M     0L  openssl 3.3.3-r0
pkg:apk/alpine/openssl@3.3.3-r0?os_name=alpine&os_version=3.21

The head commit of the main branch currently specifies FROM --platform=$BUILDPLATFORM golang:1.25.6-alpine AS builder, and I can see that dependabot PR's have been merged regularly, they just havent been published to Dockerhub outside of the per commit SHA-xyz images, which aren't a preferable version to deploy to production.

A recent issue was opened in October, asking for a new release to be published, but it was closed as completed without action (#1321) and 2.8.0 was cut last year in April, which is a long time in the world of security!

Would it be possible to have a patch release built and published to Dockerhub (v2.8.1 ?) to mitigate these underlying build chain and OS vulnerabilities?

Many thanks!

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions